amsterdam-bank

This Amsterdam Bank Wants To Hack … Itself?

Bank Wants To Hack … Itself?

With instances of professional hacking and data leaks making the news every year, it’s no secret that cybersecurity has become a major concern. How does a corporation ensure its cybersecurity remains impenetrable in a world of ever-advancing technology?

By hacking their own systems, of course.

The term’s known as penetration testing and it’s one of the more effective methods companies, financial groups and government agencies use to keep out unwanted digital penetration.

This technique of internal security testing has been used in the past, but it generally consisted of testing the physical security of a location.

In this day and age, with the tremendous value of digital data and currency, the threat of hacking has grown into a billion-dollar security issue. A perfect example of this would be the precautions set in place by the central bank of the Netherlands.

DNB Cyber Initiative

De Nederlandsche Bank, or DNB, has recently announced its intention to create a team of cybersecurity experts and hackers. Aimed at attacking the country’s financial infrastructure in order to test and improve its defenses, the attacks will be carried out in secret, targeting various banks, markets and clearinghouses.

The program will provide insight into the current state of cybersecurity the Netherlands possesses and also reveal whether or not an entire financial market can be built on a blockchain.

Program Details

According to reports from within the DNB, the cyberprogram, also known as Tiber, will consists of a red team, a white team and a blue team.

The red team will be supervised by the DNB and tasked with hacking into the various financial institutions.

The white team will be alerted to the cyberattack and is responsible for observing the encounter.

The blue team will be responsible for discovering the cyberhack, tracking it and blocking the attempt on their system.

Overall Purpose

For the Netherlands, this project will not only help identify the weaknesses of the country’s infrastructure, but it will also help justify new methods of securing the internal operations of their financial market infrastructures.

While most financial institutions have their own security measures in place, the practice of self-hacking could serve as a proactive measure against hackers who do nothing but find and exploit security vulnerabilities.

Identifying Vulnerabilities First

By the time a system has been hacked and compromised, it’s too late to do anything of real substance. Even if the hacks stopped and the infiltrator gets kicked out of the system, there’s no other option but to go through the entire system and search for residual threats.

Meanwhile, if the hack succeeds, then the entire system will be compromised — not only at that moment but also in the future. Any hacker that has taken a look at a system once will have identified several other entry points for further exploitation.

Discovering these vulnerabilities before a malicious hacker can use them not only protects the system, it also strengthens future security capabilities.

Thinking of the Future

As stated above, professional hackers spend their time thinking up ways to bypass cybersecurities and safeguards. It’s because of this consistent threat that system checks and tests must be performed on a regular basis.

In the case of the DCB, a single breach can and will threaten not only the financial security of the Netherlands, but also of the European System of Central Banks.

For online businesses and major corporations, especially ones with prolific brands such as Twitter or Amazon, the threat of a cyberattack remains constant nearly every day of the year.

It’s better to be proactive that to be caught unprepared.

By Kayla Matthews

Kayla Matthews

Kayla Matthews is a technology writer dedicated to exploring issues related to the Cloud, Cybersecurity, IoT and the use of tech in daily life.

Her work can be seen on such sites as The Huffington Post, MakeUseOf, and VMBlog. You can read more from Kayla on her personal website, Productivity Bytes.

View Website
The Internet of (Retail) Things: How mPOS Systems Make Buying Stuff High-Tech

The Internet of (Retail) Things: How mPOS Systems Make Buying Stuff High-Tech

mPOS Systems On The Rise Modern society is increasingly connected — and mobile. Those realities have also carried over to ...
Machine Learning Open-Source Tools

Do More With Machine Learning Thanks to These 6 Open-Source Tools

Machine Learning Open-Source Tools We are in the middle of a machine learning, AI and big data renaissance — at ...
How Big Data Is Aiding Police And Security Officers

How Big Data Is Aiding Police And Security Officers

Big Data Is Aiding Police Officers Big data has become a trusted resource for people in industries ranging from health ...
The Path Of Cloud Computing Is Paved With Collaboration

The Path Of Cloud Computing Is Paved With Collaboration

Cloud Computing Collaboration Cloud computing ushers in a new age of collaboration, one that allows an organization to excel at ...
Will 2018 Be the Year Augmented Reality Moves Outside ‘Pokémon Go’?

Will 2018 Be the Year Augmented Reality Moves Outside ‘Pokémon Go’?

2018 Augmented Reality If you’ve never heard of “Pokémon Go” — or at least never had the concept explained to ...
Big Data and Autism

Can Big Data Help Us Create a Medical Test for Autism?

Big Data and Autism Many mysteries surround autism spectrum disorder. Arguably, one of the largest is how to authoritatively diagnose ...
AI

These U.S. Counties Are The Best At Using AI For Their Citizens

AI For Their Citizens Every year, the Center for Digital Government conducts a survey of every county in the U.S ...
IBM and the Supercomputer - The Realities of the ‘50s Sci-fi Movies May Be Coming to Fruition

IBM and the Supercomputer – The Realities of the ‘50s Sci-fi Movies May Be Coming to Fruition

The Supercomputer In the 1950s, there were a ton of space movies. With the Space Race heating up between the ...
What You Need to Know About GameStop's Data Breach

What You Need to Know About GameStop’s Data Breach

GameStop's Data Breach Just in case you missed it, GameStop quietly announced a major data breach of sensitive customer information ...
The Computer Interface of the Future Is Voice

The Computer Interface of the Future Is Voice

The Computer Interface of the Future Is Voice Only a few years ago, many people viewed voice-recognition technology as something ...